Sammyskinekwokdoodle.com·Oct 26, 2024Configuring your first Active Directory server | Active Directory Domain Services (ADDS)Introduction Welcome, doodler! In this blog, we will discuss what an Active Directory is, know how it works, and configure it in our environment. What is Active Directory? It is a proprietary directory services product built by Microsoft Corporation ...Active Directory
Christopher Ortiz Aldanacortizaldana.hashnode.dev·Oct 21, 2024Project Stellar AccessWelcome to Project Stellar Access! In this project we will get familiar with how DHCP, DNS, and FreeIPA works. The following configurations will be done on a Rocky Linux 9.4 machine. DHCP server (192.168.1.2) BIND9 server (192.168.1.3) FreeIPA ser...Open Source
elc4br4elc4br4.hashnode.dev·Sep 29, 2024Kerberos¿Qué es Kerberos? 🐶 Kerberos es un protocolo de autenticación que sirve para autenticar dos dispositivos que se conectan entre sí. No significa que vaya a autorizarlos, sino autenticarlos. Su función es identificar cada usuario mediante cifrado. Es...1 like·48 readsActive DirectoryKerberos
Gyuhang Shimplto001.hashnode.dev·Sep 24, 2024Spark Thrift Server Configuration & ConnectionSpark Thrift Server Configuration Spark Thrift Server 가 Apache Ambari 로 설치하였다고 가정합니다. Spark Thrift Server 설정 Spark CONFIGS 로 이동하여 아래와 같이 설정을 합니다. # Advanced spark2-hive-site-override spark.thrift.server.port: 10015 (Default) hive.server2.tra...apache ambari
Ghassan Amaimiaghassanamaimia.hashnode.dev·Jun 20, 2024OSCP Journey : TJ_Null - HTB/SearchI - Introduction : Gaining the initial foothold for this box was a bit challenging, but once the process began, it became incredibly engaging. This box is an excellent example of a comprehensive Active Directory challenge and is a must-try. It covers...27 reads#cybersecurity
Dylan Hunthashofdarkness.hashnode.dev·Oct 21, 2023Kerberoasting: Using Impacket at the Gates of HadesKerberoasting is a technique used in post-exploitation attacks to extract the password hash of an Active Directory account that has a Service Principal Name (SPN). Since Kerberoasting leverages built-in AD functionality, it can be very difficult to d...#cybersecurity
Dinh Huu Locloocj.hashnode.dev·Oct 20, 2023On Attacking Kerberos Authentication Protocol in Windows Active Directory Services: A practical surveyĐây là bản dịch của bài viết này ABSTRACT Tổ chức sử dụng dịch vụ Windows Active Directory để xác thực user trong mạng với giao thức Kerberos Authentication. Do đó, cần phải nghiêm cứu tính kháng của nó đối với các loại tấn công mà nó có thể gặp phải...38 readsADKerberos
cateOVRcateovr.hashnode.dev·Sep 10, 2023Active Directory PentestingIntroduction My final year project at the University of Malaga (Spain) is the creation of an Active Directory environment for its exploitation. The objective of this project is to highlight the most common attacks that occur in real business environm...26 readsActive Directory
Maik Romaikroservice.com·Aug 24, 2023How does Kerberos work - an introduction for beginner.Introduction Kerberos is an authentication protocol that superseded NTLM with the release of Windows 2000 (technically…) Technically?! Well… It's complicated 😅 Long story short - NTLM is still alive and kicking and… it might still be the fall-back s...1 like·2.1K readshacking
Nur Kholis M.kholis.hashnode.dev·Jul 13, 2023Beeline: Failed to find any Kerberos tgtIssue: beeline failed with following errors: 3/07/13 09:43:51 [main]: ERROR transport.TSaslTransport: SASL negotiation failure javax.security.sasl.SaslException: GSS initiate failed at com.sun.security.sasl.gsskerb.GssKrb5Client.evaluateChall...28 readshive